Circuit Information Disclosure Vulnerability in Tor Daemon
CVE-2020-8516

5.3MEDIUM

Key Information:

Vendor

Torproject

Status
Vendor
CVE Published:
2 February 2020

What is CVE-2020-8516?

The Tor Daemon, up to version 0.4.1.8 and from 0.4.2.0 to 0.4.2.6, has a design that does not ensure verification of a rendezvous node before attempting a connection. This behavior could allow remote attackers to infer and discover circuit information, potentially undermining user anonymity. While the Tor network team suggests this is an intended design choice rather than a flaw, it raises concerns regarding the privacy protections that Tor claims to offer.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.